Skip to main content

Major web browsers will support web-based fingerprint, facial authentication

The World Wide Web Consortium (W3C), the entity that maintains the standards used across the internet, said on Monday, April 9, that Google, Microsoft, and Mozilla signed on to support web-based technology for biometric authentication. In other words, Chrome, Edge, and Firefox will soon support signing into online accounts using fingerprint scanners, voice authentication, facial recognition, and so on without additional software. 

The support for biometric logins stems from the Web Authentication (WebAuthn) standard submitted by the Fast Identity Online (FIDO) Alliance, another consortium focused on security solutions. It defines how browsers can utilize a component built into web pages that can access biometric-based hardware without any additional software or browser plugins installed on the user’s machine. 

Recommended Videos

Moreover, WebAuthn supports FIDO’s Client to Authenticator Protocol (CTAP). This specification enables an external device, such as a security key or smartphone, to authenticate an account or service through USB, Bluetooth, or NFC connectivity. Thus, if your desktop or laptop doesn’t include a fingerprint scanner or infrared camera, an external device could work as a substitute. 

“After years of increasingly severe data breaches and password credential theft, now is the time for service providers to end their dependency on vulnerable passwords and one-time passcodes and adopt phishing-resistant FIDO Authentication for all websites and applications,” Brett McDowell, executive director of the FIDO Alliance, said in a statement. 

Google, Microsoft, and Mozilla (and possibly Opera) are currently adding support for WebAuthn and CTAP in their browsers for Windows, MacOS, Linux, Chrome OS, and Android. Meanwhile, both specifications are now available for developers and service designers to support web-based biometric authentication. The move will help reduce or possibly prevent phishing, man-in-the-middle attacks, and credential theft. 

WebAuthn and CTAP are part of the FIDO2 Project. WebAuthn is actually a collaboration between FIDO and the W3C based on the latter’s Web API specification. WebAuthn is specifically designed to use FIDO Authentication and is backed by more than 260 FIDO members including ARM, Google, Intel, Lenovo, MasterCard, Microsoft, PayPal, Qualcomm, Samsung, Visa, and many more. 

The new specifications are backward-compatible with FIDO’s current authentication platforms: The password-free FIDO UAF and the second-factor FIDO U2F services. Both rely on biometric authentication, but the FIDO UAF version resides within an app or program and relies on a device that is registered with a website or service. The second version relies on a USB stick or NFC connection to serve as part two of a two-step authentication process. 

“FIDO will soon launch interoperability testing and will issue certifications for servers, clients, and authenticators adhering to FIDO2 specifications,” W3C adds. “Additionally, FIDO will introduce a new Universal Server certification for servers that interoperate with all FIDO authenticator types.” 

The move to use biometric authentication seeks to eliminate the need for login credentials when purchasing goods online, signing onto streaming services, and so on. Currently, many Windows 10 devices let you sign in using a finger or face via Windows Hello. Other examples include fingerprint scanners built into Apple and Samsung’s smartphones used for unlocking the devices and authorizing logins and payments. 

Kevin Parrish
Former Digital Trends Contributor
Kevin started taking PCs apart in the 90s when Quake was on the way and his PC lacked the required components. Since then…
This gorgeous Mac mini hub exacerbates the power button placement problem
M4 Mac mini with Satechi hub on a desk.

Satechi, known for its high-quality tech accessories, is updating its Mac mini hub for the new M4 model. Like previous hubs, it allows Mac mini owners to expand their storage and ports while preserving airflow, wireless signal, and performance. It looks awesome, but this time, the design highlights the problematic nature of the new Mac mini's placement of its power button.

With previous Mac mini models, the power button was at the back, making it easily accessible even when it was in a Satechi hub. The new button placement on the bottom of the PC, however, may prove even more annoying for anyone who wants to buy this accessory.

Read more
Proton VPN vs. Mullvad: Which is the best open-source VPN?
Proton VPN Plus and Mullvad websites appear in a split-screen on a PC monitor.

Open-source software is exploding in popularity and even virtual private networks (VPNs) share code for transparency. With over 100 million open-source developers contributing to the community, there’s an improved chance to find bugs and patch vulnerabilities.

Proton VPN and Mullvad are among the best VPNs available, and both are open-source solutions. You can browse the code used in Proton VPN and Mullvad on GitHub to check that there isn’t any secret logging or undisclosed data collection.

Read more
Some older D-Link routers are vulnerable to attack
D-Link Omna 180 Cam HD

A few legacy D-Link routers can be vulnerable to Remote Code Execution (RCE) attacks since the company refuses to send any updates to patch them up, claiming they have reached end-of-life, as recently posted on its announcement page.

The vulnerability is a serious issue since it allows hackers to take control from anywhere in the world and use a stack buffer overflow. This attack sends more data than the buffer size can handle, potentially corrupting critical information like the return address. Thus, hackers can take control of your PC. However, the company did not detail how the threat works, possibly not informing the hackers too much about the issue.

Read more